Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 16:09
Static task
static1
Behavioral task
behavioral1
Sample
098170f8ac53a4ee3c5f1dc139a125e2_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
098170f8ac53a4ee3c5f1dc139a125e2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
098170f8ac53a4ee3c5f1dc139a125e2_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
098170f8ac53a4ee3c5f1dc139a125e2
-
SHA1
695c4ff94c3d3d78a485457fdccef4b86abc6c4d
-
SHA256
f4c8bb4b55f9a38245108a08305fc2665e9b93cafc32b9230fd27540ffc246bb
-
SHA512
8feb9330859f9807828380195c0bc06e9025453554003a4c4e87eb2ee13d77ff8119b954878c57eca1fe1101d4fc9f8782cc782fe40813ce4df772dfe1a4b2f2
-
SSDEEP
24576:upiC2B+jEyDqSjUkVdQhY7uF2CNYXZAmxjW4BwC3sadAfI7W:2iC95RjLmJcCIDfwasI5K
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 098170f8ac53a4ee3c5f1dc139a125e2_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0aeac1551c6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007bd2b5d2c6d91e4f8f2c8e8b7d41a41500000000020000000000106600000001000020000000101d1d929c19f6b6db435724a3e6ddbe5a6d3d2e039d8ae2998373563c1ecab1000000000e8000000002000020000000687c31b6abbcd54a2335299c145bb7fc14ddd154ac29776134f516ce4184c2ee20000000cd981395731b85f5362a45a008e6431f4696e2751f1d72c3fbf8f6c01cc2a6d640000000d6d53632bf31dd20cbb85760e9443787ad3c82e0b0db893d62b3935e788f358ed84b4c7fbeed20623b61942a0f84449c72c400d741fd08c367d5b893091e84e8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007bd2b5d2c6d91e4f8f2c8e8b7d41a415000000000200000000001066000000010000200000003b4dff404d2ca8f423a3b1b995a0abe440409eaec3b26c28a723bf78a8553901000000000e80000000020000200000001cdccbf9f699715f48a8c633cf643520d672a9868378096a7a3e1b8a5e5b55812000000008aa911a7f6d9a24203219e9395071668b2d9fc2fea00dd55190c5a78b4c4fd040000000cfcec18b3e8e77f476823e0e71b6bed486def41c80a067057014f72daa6f7d5dd6a6897b1076b7d9fd3aa955d937705012ba7a1b1563e8d6c1449796b52be0f4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8024b61551c6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{32DACCEA-3244-11EF-BCA5-DAA7D34B912A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{32DD2F12-3244-11EF-BCA5-DAA7D34B912A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425407275" iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4596 iexplore.exe 1224 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4920 098170f8ac53a4ee3c5f1dc139a125e2_JaffaCakes118.exe 4920 098170f8ac53a4ee3c5f1dc139a125e2_JaffaCakes118.exe 1224 iexplore.exe 1224 iexplore.exe 4596 iexplore.exe 4596 iexplore.exe 3696 IEXPLORE.EXE 3696 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4920 wrote to memory of 4596 4920 098170f8ac53a4ee3c5f1dc139a125e2_JaffaCakes118.exe 80 PID 4920 wrote to memory of 4596 4920 098170f8ac53a4ee3c5f1dc139a125e2_JaffaCakes118.exe 80 PID 4920 wrote to memory of 1224 4920 098170f8ac53a4ee3c5f1dc139a125e2_JaffaCakes118.exe 81 PID 4920 wrote to memory of 1224 4920 098170f8ac53a4ee3c5f1dc139a125e2_JaffaCakes118.exe 81 PID 1224 wrote to memory of 2508 1224 iexplore.exe 82 PID 1224 wrote to memory of 2508 1224 iexplore.exe 82 PID 1224 wrote to memory of 2508 1224 iexplore.exe 82 PID 4596 wrote to memory of 3696 4596 iexplore.exe 83 PID 4596 wrote to memory of 3696 4596 iexplore.exe 83 PID 4596 wrote to memory of 3696 4596 iexplore.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\098170f8ac53a4ee3c5f1dc139a125e2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\098170f8ac53a4ee3c5f1dc139a125e2_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://bbs.3996.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4596 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3696
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.zhaowg.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1224 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{32DACCEA-3244-11EF-BCA5-DAA7D34B912A}.dat
Filesize5KB
MD565b6acc1fa76e1f8f09bdc4255c614ad
SHA172f62b0ead0b7e67a80d2ce23319af20b05bd52c
SHA2567f7c5772694c8478db55a356d989d44940b291004eb9750bd6be51ddfcea7687
SHA51286c25e0484edf16dee00e12be22a03d3071629154e807cd79d4140aaad5d2836e8307d372e7c0ee8d34949dee52b68ca6d22ff7e1321f9c0aa49717b14e7094b
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{32DD2F12-3244-11EF-BCA5-DAA7D34B912A}.dat
Filesize3KB
MD5fd50f8bb80ac5549f9dca46684dfad42
SHA19837b713fad739d5c3658548a87d1f1458d674de
SHA256da7b7e038f8aba67e20be7e38eb9b08579240e407588b8abc7533f8bb42c7419
SHA512fb1af059c0785dd8d8686fae156a8f71af65d1adcbda2b9d743ee8968ef47365d80a748e9d6a9ba2650001b78f5817f02a05e366273e4fd1de451c62a1adf9cf